{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:35:34Z","timestamp":1760402134849,"version":"build-2065373602"},"reference-count":36,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T00:00:00Z","timestamp":1587945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>The evolution of the Internet of Things is significantly affected by legal restrictions imposed for personal data handling, such as the European General Data Protection Regulation (GDPR). The main purpose of this regulation is to provide people in the digital age greater control over their personal data, with their freely given, specific, informed and unambiguous consent to collect and process the data concerning them. ADVOCATE is an advanced framework that fully complies with the requirements of GDPR, which, with the extensive use of blockchain and artificial intelligence technologies, aims to provide an environment that will support users in maintaining control of their personal data in the IoT ecosystem. This paper proposes and presents the Intelligent Policies Analysis Mechanism (IPAM) of the ADVOCATE framework, which, in an intelligent and fully automated manner, can identify conflicting rules or consents of the user, which may lead to the collection of personal data that can be used for profiling. In order to clearly identify and implement IPAM, the problem of recording user data from smart entertainment devices using Fuzzy Cognitive Maps (FCMs) was simulated. FCMs are an intelligent decision-making system that simulates the processes of a complex system, modeling the correlation base, knowing the behavioral and balance specialists of the system. Respectively, identifying conflicting rules that can lead to a profile, training is done using Extreme Learning Machines (ELMs), which are highly efficient neural systems of small and flexible architecture that can work optimally in complex environments.<\/jats:p>","DOI":"10.3390\/bdcc4020009","type":"journal-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T05:05:32Z","timestamp":1588050332000},"page":"9","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processing in the IoT Ecosystem"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1330-5228","authenticated-orcid":false,"given":"Konstantinos","family":"Demertzis","sequence":"first","affiliation":[{"name":"Department of Computer Science, International Hellenic University, 65404 Kavala, Greece"}]},{"given":"Konstantinos","family":"Rantos","sequence":"additional","affiliation":[{"name":"Department of Computer Science, International Hellenic University, 65404 Kavala, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8130-5775","authenticated-orcid":false,"given":"George","family":"Drosatos","sequence":"additional","affiliation":[{"name":"Institute for Language and Speech Processing, Athena Research Centre, 67100 Xanthi, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Shahid, N., and Aneja, S. (2017, January 10\u201311). Internet of Things: Vision, application areas and research challenges. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058246"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"AboBakr, A., and Azer, M.A. (2017, January 19\u201320). IoT Ethics Challenges and Legal Issues. Proceedings of the 2017 12th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt.","DOI":"10.1109\/ICCES.2017.8275309"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Vegh, L. (2018, January 14\u201316). A Survey of Privacy and Security Issues for the Internet of Things in the GDPR Era. Proceedings of the 2018 International Conference on Communications (COMM), Bucharest, Romania.","DOI":"10.1109\/ICComm.2018.8453643"},{"key":"ref_4","unstructured":"(2020, April 11). General Data Protection Regulation (GDPR)\u2014Official Legal Text. Available online: https:\/\/gdpr-info.eu."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"682","DOI":"10.1016\/j.ijinfomgt.2014.05.004","article-title":"Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?","volume":"34","author":"Avoine","year":"2014","journal-title":"Int. J. Inf. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Bilenko, M., and Richardson, M. (2011, January 21\u201324). Predictive Client-Side Profiles for Personalized Advertising. Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA.","DOI":"10.1145\/2020408.2020475"},{"key":"ref_7","first-page":"201","article-title":"Model-Driven Design of Web Applications with Client-Side Adaptation","volume":"Volume 3140","author":"Koch","year":"2004","journal-title":"Proceedings of the International Conference on Web Engineering"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3360498","article-title":"A Survey on Interdependent Privacy","volume":"52","author":"Humbert","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Shehab, M., and Paci, F. (2009, January 20\u201324). Collective Privacy Management in Social Networks. Proceedings of the 18th International Conference on World Wide Web (WWW \u201909), Madrid, Spain.","DOI":"10.1145\/1526709.1526780"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., and Hopper, N.J. (2010, January 21\u201323). unFriendly: Multi-party Privacy Risks in Social Networks. Proceedings of the International Symposium on Privacy Enhancing Technologies, Berlin, Germany.","DOI":"10.1007\/978-3-642-14527-8"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Wachter, S. (2018, January 28\u201329). Ethical and Normative Challenges of Identification in the Internet of Things. Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT-2018, London, UK.","DOI":"10.1049\/cp.2018.0013"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rantos, K., Drosatos, G., Demertzis, K., Ilioudis, C., and Papanikolaou, A. (2018, January 26\u201328). Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018), Porto, Portugal.","DOI":"10.5220\/0006911007380743"},{"key":"ref_13","unstructured":"Lanet, J.-L., and Toma, C. (2019). ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology. Innovative Security Solutions for Information Technology and Communications, Springer International Publishing."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1431578","DOI":"10.1155\/2019\/1431578","article-title":"A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem","volume":"2019","author":"Rantos","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez-Serrano, J., Mu\u00f1oz, J.L., Le\u00f3n, O., Mikkelsen, L., Schwefel, H.-P., and Br\u00f6ring, A. (2018, January 4\u20137). Privacy risk analysis in the IoT domain. Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain.","DOI":"10.1109\/GIOTS.2018.8534534"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kraijak, S., and Tuwanut, P. (2015, January 21\u201323). A Survey on IoT Architectures, Protocols, Applications, Security, Privacy, Real-World Implementation and Future Trends. Proceedings of the 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai, China.","DOI":"10.1049\/cp.2015.0714"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/JIOT.2018.2864168","article-title":"Privacy in Internet of Things: From Principles to Technologies","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Crompton, S., and Jensen, J. (2018, January 17\u201320). Towards a Secure and GDPR-Compliant Fog-to-Cloud Platform. Proceedings of the 2018 IEEE\/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), Zurich, Switzerland.","DOI":"10.1109\/UCC-Companion.2018.00071"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Subahi, A., and Theodorakopoulos, G. (2018, January 6\u20138). Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement. Proceedings of the 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain.","DOI":"10.1109\/FiCloud.2018.00022"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Imtiaz, S., Sadre, R., and Vlassov, V. (2019, January 14\u201317). On the Case of Privacy in the IoT Ecosystem: A Survey. Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA.","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00177"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ca\u00f1edo, J., and Skjellum, A. (2016, January 12\u201314). Using machine learning to secure IoT systems. Proceedings of the 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand.","DOI":"10.1109\/PST.2016.7906930"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"7702","DOI":"10.1109\/JIOT.2019.2901840","article-title":"Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities","volume":"6","author":"Shen","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Jeong, H.-J., Lee, H.-J., and Moon, S.-M. (2017, January 15\u201320). Work-in-Progress: Cloud-Based Machine Learning for IoT Devices with Better Privacy. Proceedings of the 2017 International Conference on Embedded Software (EMSOFT), Seoul, Korea.","DOI":"10.1145\/3125503.3125626"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Guntamukkala, N., Dara, R., and Grewal, G. (2015, January 9\u201311). A Machine-Learning Based Approach for Measuring the Completeness of Online Privacy Policies. Proceedings of the 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), Miami, FL, USA.","DOI":"10.1109\/ICMLA.2015.143"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Schl\u00e4ger, C., and Pernul, G. (2008, January 4\u20137). Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, Barcelona, Spain.","DOI":"10.1109\/ARES.2008.23"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3704","DOI":"10.1016\/j.asoc.2012.01.015","article-title":"Fuzzy cognitive maps for artificial emotions forecasting","volume":"12","author":"Salmeron","year":"2012","journal-title":"Appl. Soft Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1707","DOI":"10.1007\/s10462-017-9575-1","article-title":"A review on methods and software for fuzzy cognitive maps","volume":"52","author":"Felix","year":"2019","journal-title":"Artif. Intell. Rev."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.ijar.2004.01.001","article-title":"Active Hebbian learning algorithm to train fuzzy cognitive maps","volume":"37","author":"Papageorgiou","year":"2004","journal-title":"Int. J. Approx. Reason."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1860010","DOI":"10.1142\/S0218213018600102","article-title":"FCM Expert: Software Tool for Scenario Analysis and Pattern Classification Based on Fuzzy Cognitive Maps","volume":"27","author":"Espinosa","year":"2018","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"N\u00e1poles, G., Leon, M., Grau, I., and Vanhoof, K. (2017, January 6\u20138). Fuzzy Cognitive Maps Tool for Scenario Analysis and Pattern Classification. Proceedings of the 2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI), Boston, MA, USA.","DOI":"10.1109\/ICTAI.2017.00103"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","article-title":"Extreme learning machine: Theory and applications","volume":"70","author":"Huang","year":"2006","journal-title":"Neurocomputing"},{"key":"ref_32","unstructured":"Strutz, T. (2015). Data Fitting and Uncertainty: A Practical Introduction to Weighted Least Squares and Beyond, Springer Vieweg. [2nd ed.]."},{"key":"ref_33","first-page":"37","article-title":"Evaluation: From precision, recall and F-measure to ROC, informedness, markedness & correlation","volume":"2","author":"Powers","year":"2011","journal-title":"J. Mach. Learn. Technol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MSP.2010.40","article-title":"Inferring Personal Information from Demand-Response Systems","volume":"8","author":"Lisovich","year":"2010","journal-title":"IEEE Secur. Priv."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Palmieri, P., Calderoni, L., and Maio, D. (2017, January 15\u201317). Private inter-network routing for Wireless Sensor Networks and the Internet of Things. Proceedings of the Computing Frontiers Conference (CF \u201917), Siena, Italy.","DOI":"10.1145\/3075564.3079068"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.neunet.2015.08.011","article-title":"Hadoop neural network for parallel and distributed feature selection","volume":"78","author":"Hodge","year":"2016","journal-title":"Neural Netw."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/4\/2\/9\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:23:56Z","timestamp":1760361836000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/4\/2\/9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,27]]},"references-count":36,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["bdcc4020009"],"URL":"https:\/\/doi.org\/10.3390\/bdcc4020009","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2020,4,27]]}}}